Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0146001 NETWORK SECURITY BASED ON DEVICE IDENTIFIERS AND NETWORK ADDRESSES
Techniques for network security are disclosed. In some implementations, an evaluation module determines whether a network communication from a computing device...
2018/0146000 EVENT INFORMATION ACCESS INTERFACE IN DATA INTAKE STAGE OF A DISTRIBUTED DATA PROCESSING SYSTEM
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The...
2018/0145999 METHOD AND SYSTEM FOR NETWORK INTRUSION DETECTION BASED ON GEOGRAPHICAL INFORMATION
The present invention discloses a method for identifying an intrusion in a computer network, wherein the method is based on the analysis of geographical...
2018/0145998 Acquiring Browser Data with Application Data
The systems and methods that identify fraud committed using native applications and web applications are provided. A native application executing on a client...
2018/0145997 NETWORK SECURITY DATABASE FILTERING TOOL
A method comprises creating a word vector from a message, wherein the word vector comprises creating a word vector from a message stored in a database, wherein...
2018/0145996 NETWORK SECURITY DATABASE SORTING TOOL
A method comprises creating a word vector from a message, wherein the word vector comprises an entry for each word of a plurality of words, and wherein each...
2018/0145995 DETECTING ATTACKS USING PASSIVE NETWORK MONITORING
Embodiments are directed to detecting one or more attacks in a network. One or more network flows may be monitored using one or more network monitoring...
2018/0145994 SYSTEM AND METHOD FOR PROVIDING DATA AND DEVICE SECURITY BETWEEN EXTERNAL AND HOST DEVICES
A secure data exchange system comprising a security device including a first external device plug, and a security engine operative to enforce a security policy...
2018/0145993 URL MATCHING APPARATUS, URL MATCHING METHOD, AND URL MATCHING PROGRAM
A URL matching apparatus generates partial character string information storing therein, as keys of an associative array, partial character strings obtained by...
2018/0145992 DATA VERIFICATION METHOD
Method for verifying data generated by an electronic device included in equipment, the electronic device including a computing unit, a one-time programmable...
2018/0145991 EFFICIENT AND SECURE METHOD AND APPARATUS FOR FIRMWARE UPDATE
This relates to a vehicle and, more particularly to, a vehicle configured to perform a secure firmware update. Some examples of the disclosure include...
2018/0145990 MULTI-FACTOR AUTHENTICATION USING POSITIONING DATA
Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system...
2018/0145989 OPTIMIZING RESOURCE ALLOCATION FOR PROJECTS EXECUTING IN A CLOUD-BASED ENVIRONMENT
Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements...
2018/0145988 SIGNALING CONDITIONAL ACCESS SYSTEM SWITCHING AND KEY DERIVATION
A method and apparatus for controlling a group of the client devices to switch at least one client device of the group of client devices from a first...
2018/0145987 SYSTEMS AND METHODS FOR INTERACTING WITH MEDIA DEVICES
Systems, methods, and non-transitory computer-readable media can receive at least one request for performing one or more operations, the request originating...
2018/0145986 NETWORK SECURITY BASED ON REDIRECTION OF QUESTIONABLE NETWORK ACCESS
Techniques for network security are disclosed. In some implementations, an evaluation module determines whether a network communication from a source computing...
2018/0145984 SYSTEM AND METHOD FOR PROVIDING SECURITY SOLUTIONS TO PROTECT ENTERPRISE CRITICAL ASSETS
Exemplary embodiments of the present disclosure are directed towards a system and method for providing security solutions to protect enterprise critical...
2018/0145983 DISTRIBUTED DATA STORAGE SYSTEM USING A COMMON MANIFEST FOR STORING AND ACCESSING VERSIONS OF AN OBJECT
The present disclosure provides a system and method to perform access control authentication using a cryptographic hash of the encoding of access control...
2018/0145982 METHOD AND NODES FOR HANDLING ACCESS TO EPC SERVICES VIA A NON-3GPP NETWORK
The embodiments herein relate to a method performed by a PGW (108) for handling a UEs (101) access to an EPC service via a non-3GPP access network (103)....
2018/0145981 PACKET TRANSMISSION METHOD, APPARATUS, AND SYSTEM
A method includes: setting up, by a first network device, a MACSec channel to a second network device according to the MACSec protocol; and sending, by the...
2018/0145980 APPARATUS AND METHOD FOR SECURE PROVISIONING OF A COMMUNICATION DEVICE
A system that incorporates the subject disclosure may perform, for example, obtaining programming data via an over-the-air programming message for use by a...
2018/0145979 METHOD AND DEVICE FOR REGISTERING BASED ON AUTHENTICATING DEVICE
A registering method involving an authenticating device includes: a client obtains a URI, obtains an application ID according to the URI, obtains a device...
2018/0145978 RULE-BASED FINGERPRINT GENERATION METHOD AND APPARATUS
A device information gathering method is provided. The device information gathering method includes: allowing a device information gathering apparatus to...
2018/0145977 IN-VEHICLE AUTHENTICATION SYSTEM
An in-vehicle authentication system is disclosed. The in-vehicle authentication system includes a first authentication object apparatus; and a second...
2018/0145976 NETWORK AUTHENTICATION OF A GEO-FENCED VOLUME
Provided is a method for managing a software defined network using a software control layer to regulate a geo-fenced volume. The software control layer can use...
2018/0145975 SYSTEMS AND METHODS FOR AUTHENTICATING A USER BASED ON A BIOMETRIC MODEL ASSOCIATED WITH THE USER
Systems and methods as provided herein may create a biometric model associated with a user. The created biometric model may be used to generate challenges that...
2018/0145974 Server and/or Client Device Authentication
Embodiments of systems and methods for client and/or server authentication are provided. In one embodiment, a method includes sending information from a mobile...
2018/0145973 TRUST METRICS ON SHARED COMPUTERS
Particular embodiments of a verification authority associated with a web service may receive a request to access the web service. The request may comprise data...
2018/0145972 Securely Orchestrating Events Initiated at Remote Servers Using a Certificate Server
Aspects of the disclosure relate to securely orchestrating events initiated at remote servers using a certificate server. A computing platform may receive,...
2018/0145971 MOBILE DEVICE USING SHARED DIGITAL CERTIFICATE FOR DIFFERENT MANAGED ENTERPRISE APPLICATIONS AND RELATED METHODS
A mobile device may include at least one memory and a processor cooperating with the at least one memory to store a plurality of managed enterprise...
2018/0145970 SYSTEMS AND METHODS FOR PERFORMING SECURE BACKUP OPERATIONS
The disclosed computer-implemented method for performing secure backup operations may include (i) identifying a backup server that has been designated to...
2018/0145969 SYSTEMS AND METHODS FOR PERFORMING SECURE BACKUP OPERATIONS
The disclosed computer-implemented method for performing secure backup operations may include (i) identifying a group of backup servers with heterogeneous...
2018/0145968 SINGLE SIGN-ON FOR MANAGED MOBILE DEVICES
Disclosed are various examples for providing a single sign-on experience for managed mobile devices. A management application executed in a computing device...
2018/0145967 AUTHORIZATION SERVER, NON-TRANSITORY COMPUTER-READABLE MEDIUM, AND AUTHORITY DELEGATING SYSTEM
An authorization server, comprises: receiving from a client an authorization request in which a scope group, with which one or a plurality of scopes that...
2018/0145966 PROTECTION OF APPLICATION PASSWORDS USING A SECURE PROXY
Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target...
2018/0145965 PROTECTION OF APPLICATION PASSWORDS USING A SECURE PROXY
Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target...
2018/0145964 Sharing Access to a Media Service
Examples provided herein are directed to a computing device and media playback system sharing access to a media service corresponding to a media application...
2018/0145963 Table-Connected Tokenization
A tokenization system tokenizes sensitive data to prevent unauthorized entities from accessing the sensitive data. The tokenization system accesses sensitive...
2018/0145962 SERVER DEVICE, INFORMATION MANAGEMENT SYSTEM, INFORMATION MANAGEMENT METHOD, AND COMPUTER PROGRAM
A server device for safely managing information is configured to store prescribed character codes and converted character codes in correlation with each other,...
2018/0145961 COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND COMPUTER PROGRAM
A communication system includes: a first communication unit configured to communicate with a terminal apparatus; an authentication unit configured to transmit...
2018/0145960 CACHED CREDENTIALS FOR OFFLINE DOMAIN JOIN AND LOGIN WITHOUT LOCAL ACCESS TO THE DOMAIN CONTROLLER
Techniques are described for performing an offline domain join and login on behalf of a computing device in order to enable the device to access corporate...
2018/0145959 Method for determining access privilege using username, IP address, App ID, App Key, and biometric signature...
Method for determining access privilege using username, IP address, App ID, App Key, and biometric signature sample.
2018/0145958 INFORMATION PROCESSING DEVICE, INFORMATION MANAGEMENT METHOD, AND INFORMATION PROCESSING SYSTEM
An information processing device that is connected to another information processing device includes a memory storing a program, a first authentication...
2018/0145957 USER-DEFINED DYNAMIC PASSWORD
In an embodiment, a password management system may include a static password associated with a user ID, and a user-defined function associated with the user ID...
2018/0145956 TOUCH-SHARE CREDENTIAL MANAGEMENT ON MULTIPLE DEVICES
Embodiments include method, systems and computer program products for credential management. Aspects include obtaining a first biometric information by a first...
2018/0145955 METHODS AND APPARATUS TO MANAGE CREDENTIALS IN HYPER-CONVERGED INFRASTRUCTURES
Methods, apparatus, systems and articles of manufacture manage credentials in hyper-converged infrastructure s are disclosed. An example method includes...
2018/0145954 RISK-BASED ENCRYPTION OF COMMUNICATION ON A COMPUTER SYSTEM NODE
A streams manager assesses the security risk of streams communication and when possible turns off encryption of intranode communication between operators of a...
2018/0145953 RIGHTS CONTROLLED COMMUNICATION
A computerized process is described for transferring content from a first entity to a second entity including first transferring separately and via a database...
2018/0145952 PROTECTIVE APPARATUS AND NETWORK CABLING APPARATUS FOR THE PROTECTED TRANSMISSION OF DATA
Provided is a network cabling apparatus and protective apparatus for the protected transmission of data, comprising two protective devices which are assigned...
2018/0145951 SYSTEM, APPARATUS AND METHOD FOR PROVIDING TRUSTED INPUT/OUTPUT COMMUNICATIONS
In one embodiment, an apparatus includes a wireless controller, which may include a byte stream parser to receive a stream of data from one or more wireless...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.